Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
computer viruses and theirs effects on a computer
computer viruses and theirs effects on a computer
computer viruses and theirs effects on a computer
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: computer viruses and theirs effects on a computer
Internet & Email Threats
Definition of a Computer Virus
A program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses as well as email attachments. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.
Why Do People Write Computer Viruses?
Some general reasons are to experiment how to write viruses or to test their programming talent. Some get a kick out of seeing how the virus spreads, and some do it for cyber fame. One reason I can think of is the same psychology that drives vandals and arsonists. Why would someone want to break the window on someone else's car?, spray paint on buildings? Set fire to things? For some people that seems to be a thrill.
How Can I Prevent My Computer From Being Infected By A Computer Virus?
Buy a well known Anti-Virus Software such as McAfee or Norton and KEEP THE VIRUS DEFINITIONS UP TO DATE! Set it to scan email attachments and periodically scan your hard drives for infections.
Be careful of what you download from the Internet! Only download files and programs that are from trusted sources. Once downloaded, use your Anti-Virus software to scan them for viruses. Downloading music or videos from file sharing communities such as iMesh or WinMX, Etc. is a popular way of distributing viruses.
If you are using Microsoft Outlook, close the email preview pane (On the toolbar click "View" and uncheck "Preview Pane"). The reason for this is that some emails (with or without attachments) are infected with program scripts that will run when the email is opened. If the email message is viewable in the preview pane the email is technically opened and the script can execute.
Lastly, USE YOUR HEAD! If an email attachment or file download seems suspicious, DON'T OPEN IT!
---------------------------------------------------------------------------------------------------------------------------------
Definition of Spyware
Software that sends information about your Internet sessions back to the computer from which it's launched. Spyware is often built into free downloads and works in the background without a user's knowledge.
Why Do People Write Spyware?
It's often used to create marketing profiles based on surfing habits. Basically it records when and where you have gone on the internet, what you have been searching for and reports its findings back to the company who created the program.
There are probably as many answers to that question as there are hackers (maybe more). It is important to realize that these people are individuals with their own hopes, fears, desires, and everything else that comes with being human. However, there are general patterns to the motivation behind the computer hacker's drive to manipulate technology. The problem of hacker motivation is probably one of the more interesting questions concerning this sub-culture (Hacker-Bible, 1995).
Trojans are a type of program that can and usually will hurt a PC through software and hardware. The way it gets into the computer is by fooling the computer user into thinking that some software he/she found online is safe. When the person downloads the software, it is not actually useful software. It is actually a Trojan which has now invaded the PC. Once in, it allows the creator of the Trojan to access and control the computer from his own house. The hacker can then access passwords, important documents, and other stuff that will be mentioned later. The malware does not make ...
Other ways of “Staying Safe” are by: avoiding misuse of images, using encryption, using copy lists with
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
CONTENT FILTERING: Which is to verify downloads whether they are malicious and proceed to download. This is simple and will yield good
Why do people pirate software? The obvious answer is: people want to use the software, but not pay for it. However, when we change the question slightly, to: “Why do people steal source code?” A variety of interesting answers can pop up. Possibly, the thief wants to modify the code, make copies of it, and proceed to sell it as his own creation -- for a profit. Or, perhaps the perpetrator is a raging open source advocate and he simply wants to examine the stolen code to improve his programming skills. As harmless as the latter may sound, it is still a clearly defined crime in virtually every hi-tech country in the world.1
Especially it has come from a trusted source. No one doubted that his friends send him a virus From this point would be confident and open the message After the process repeated infected and the virus spreads quickly terrible, This virus penetrates the Word System in the infected machine and modifies it uses the infected Word files to send itself, which sends itself by e-mail lists in Microsoft Outlook Express and more than 50 people. (Carnegie Mellon University, 1999)
The protection of your network requires a level of network security. If you do not have security on your network, then you are capable of being hacked or receiving malware, spy, virus, and lots more. There are many programs or applications that can help detect and prevent strange activities on your computer, but there is also ways that you can help prevent anything from happening. Creating a password for your network is a good start toward protection of your computer. Try to make the password something only you would know, and maybe throw some numbers in there as well to maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves,...
Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16).
Delete Spam mails immediately and report such mails from unknown parties. DO NOT open spam e-mail, click on links in the e-mail, or open attachments. These often contain malware that will give subjects access to your computer system. 8. Forward vs. Reply: Do not use the “Reply” option to respond to any business e-mails.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Malicious software, or simply malware, can be described as software that a computer user never authorized to be loaded. This means that the software can be found on user’s computer without his or her knowledge. Furthermore, a malware can be described as software that collects private information from any computer without user’s knowledge and authorization. As the name suggests, this software is malicious and can do great damage to a computer, mobile device, or other related devices. This damage can range from something as slight as altering the author’s name on a document to massive damage like making an entire device fail to function properly (Töyssy and Marko 109). The good news is that malwares can be controlled or prevented. As a matter of fact, it does not cost a fortune to keep a device safe from malware attacks. It also needs enough knowledge about them. In order to be able to do this, however, it is important to understand the various terminologies used to describe malicious software.
It allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. E.g. Yahoo mail, Gmail, Hotmail.
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.
...ement a chip into the motherboards to scan and analyze people’s online activities. The motherboard is the main system component of computers and all the hardware such as hard drives, video cards, sounds cards and anything else that you connect to your computer must be run through the mother board. So essentially all your activities could be monitored—especially the transfer of large files, such as songs and movies.